Juniper Networks IDP 4.0 & NSM 2006.1

CSV information ?

Status archived
Valid from 23.10.2006
Valid until 06.09.2012
Scheme 🇺🇸 US
Manufacturer Juniper Networks, Inc.
Category Network and Network-Related Devices and Systems
Security level EAL2

Heuristics summary ?

Certificate ID: CCEVS-VR-06-0043

Certification report ?

Extracted keywords

Vendor
Microsoft

Security level
EAL 2
Claims
T.COMDIS, T.COMINT, T.FACCNT, T.IMPCON, T.INFLUX, T.LOSSOF, T.NOHALT, T.PRIVIL, T.FALACT, T.FALASC, T.FALREC, T.INADVE, T.MISACT, T.MISUSE, T.SCNCFG, T.SCNMLC, T.SCNVUL, A.ACCESS, A.ASCOPE, A.DYNMIC, A.MANAGE, A.NOEVIL, A.NOTRST, A.LOCATE, A.PROTCT
Certificates
CCEVS-VR-06-0043

Side-channel analysis
malfunction

File metadata

Title: Validation Report for Juniper Networks
Author: Validation Team
Creation date: D:20061101093929-05'00'
Modification date: D:20061101093947-05'00'
Pages: 16
Creator: Acrobat PDFMaker 7.0 for Word
Producer: Acrobat Distiller 7.0 (Windows)

Frontpage

Certificate ID: CCEVS-VR-06-0043
Certified item: Juniper Networks JUNIPER NETWORKS IDP 4.0 & NSM 2006.1
Certification lab: US NIAP

References

Security target ?

Extracted keywords

Hash functions
MD5
Protocols
SSH

Vendor
Microsoft

Security level
EAL2, EAL 2, EAL1
Claims
O.ACCESS, O.EADMIN, O.IDAUTH, O.IDSENS, O.OFLOWS, O.RESPON, O.CREDEN, O.INTROP, O.PHYCAL, O.AUDITS, O.IDANLZ, O.IDSCAN, O.INTEGR, O.PROTCT, O.INSTAL, O.PERSON, O.EXPORT, T.COMDIS, T.FACCNT, T.FALASC, T.IMPCON, T.INFLUX, T.MISACT, T.NOHALT, T.SCNCFG, T.SCNVUL, T.COMINT, T.LOSSOF, T.PRIVIL, T.FALACT, T.FALREC, T.INADVE, T.MISUSE, T.SCNMLC, A, A.ACCESS, A.DYNMIC, A.MANAGE, A.NOTRST, A.ASCOPE, A.NOEVIL, A.LOCATE, A.PROTCT, OE.AUDIT_PROTECTION, OE.TIME, OE.PROTECT
Security Assurance Requirements (SAR)
ACM_CAP, ACM_CAP.2, ADO_DEL, ADO_IGS, ADO_DEL.1, ADO_IGS.1, ADV_FSP, ADV_HLD, ADV_RCR, ADV_FSP.1, ADV_HLD.1, ADV_RCR.1, AGD_ADM, AGD_USR, AGD_ADM.1, AGD_USR.1, ATE_COV, ATE_FUN, ATE_IND, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_SOF, AVA_VLA, AVA_SOF.1, AVA_VLA.1
Security Functional Requirements (SFR)
FAU_GEN, FAU_GEN.1, FAU_SAR.1, FAU_SAR.2, FAU_SAR.3, FAU_SEL.1, FAU_STG.4, FAU_STG.2, FAU_GEN.1.1, FAU_GEN.1.2, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_SAR.3.1, FAU_SEL.1.1, FAU_STG.4.1, FAU_STG.2.1, FAU_STG.2.2, FAU_STG.2.3, FIA_ATD.1, FIA_UAU.1, FIA_UID.1, FIA_UAU, FIA_ATD.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UID.1.1, FIA_UID.1.2, FIA_AFL.1, FMT_MOF.1, FMT_MTD, FMT_SMF.1, FMT_SMR.1, FMT_MOF.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MDT.1, FPT_ITT.1, FPT_RVM.1, FPT_SEP.1, FPT_STM.1, FPT_ITT.1.1, FPT_RVM.1.1, FPT_SEP.1.1, FPT_SEP.1.2, FPT_STM.1.1, FPT_ITA.1, FPT_ITC.1, FPT_ITI.1, FPT_STM

Side-channel analysis
malfunction

Standards
ISO/IEC 15408, ISO/IEC 18045

File metadata

Title: Security Target
Keywords: Intrusion Detection System (IDS), Intrusion Detection & Prevention system (IDP), IDP Sensorâ„¢, the IDP Management Serverâ„¢, IDP User Interfaceâ„¢
Author:
Creation date: D:20061101102236-05'00'
Modification date: D:20061101103840-05'00'
Pages: 91
Creator: Acrobat PDFMaker 7.0 for Word
Producer: Acrobat Distiller 7.0 (Windows)

References

Heuristics ?

Certificate ID: CCEVS-VR-06-0043

Extracted SARs

AGD_ADM.1, ATE_COV.1, ADV_HLD.1, ADV_FSP.1, AVA_VLA.1, ATE_FUN.1, AGD_USR.1, ATE_IND.2, ADV_RCR.1, AVA_SOF.1

References ?

Updates ?

  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Juniper Networks IDP 4.0 & NSM 2006.1 was processed.

  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {'cert_id': 'CCEVS-VR-06-0043', 'cert_item': 'Juniper Networks JUNIPER NETWORKS IDP 4.0 & NSM 2006.1', 'cert_lab': 'US NIAP'}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['4.0', '2006.1']}.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}}.
    • The cert_lab property was set to ['US'].
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'AVA_VLA', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_HLD', 'level': 1}, {'_type': 'SAR', 'family': 'ACM_CAP', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'SAR', 'family': 'ADO_IGS', 'level': 1}, {'_type': 'SAR', 'family': 'ADO_DEL', 'level': 1}]}}.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': 'a9a53c19529c17bb454bf50e828dc9e8e480a2902763471c6aa30c6d0a52dc6f', 'st_pdf_hash': '91669b8384fc571c070dfbf15082d7b1a5f92f63d14623b36b9a7fc8cfe96204', 'report_txt_hash': 'cb58a3c22bfaec1928856e8cd27bc8e11c5eb68a0fc001b7206b938b06286c91', 'st_txt_hash': '874d98426913cc02761e00ebd74d75efd3909701b8768dd2420d4ecee2ec2de1'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {}, 'rules_randomness': {}, 'rules_tee': {'SE': 2}, 'rules_side_channels': {'malfunction': 1}} values inserted.
    • The st_keywords property was updated, with the {'rules_symmetric_crypto': {}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {'MD5': 1}, 'rules_crypto_schemes': {}, 'rules_randomness': {}, 'rules_tee': {'SE': 4}, 'rules_side_channels': {'malfunction': 2}} values inserted.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_extract_ok property was set to False.
    • The report_extract_ok property was set to False.
    • The errors property was set to ['Failed to read metadata of certs/reports/pdf/036e98932e0c6665.pdf, error: can only concatenate list (not "IndirectObject") to list', 'Failed to read metadata of certs/targets/pdf/036e98932e0c6665.pdf, error: can only concatenate list (not "IndirectObject") to list', 'Failed to read metadata of certs/reports/pdf/036e98932e0c6665.pdf, error: can only concatenate list (not "IndirectObject") to list', 'Failed to read metadata of certs/targets/pdf/036e98932e0c6665.pdf, error: can only concatenate list (not "IndirectObject") to list'].

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_keywords property was set to {'cc_cert_id': {'US': {'CCEVS-VR-06-0043': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 2': 3}}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {'T': {'T.COMDIS': 1, 'T.COMINT': 1, 'T.FACCNT': 1, 'T.IMPCON': 1, 'T.INFLUX': 1, 'T.LOSSOF': 1, 'T.NOHALT': 1, 'T.PRIVIL': 1, 'T.FALACT': 1, 'T.FALASC': 1, 'T.FALREC': 1, 'T.INADVE': 1, 'T.MISACT': 1, 'T.MISUSE': 1, 'T.SCNCFG': 1, 'T.SCNMLC': 1, 'T.SCNVUL': 1}, 'A': {'A.ACCESS': 1, 'A.ASCOPE': 1, 'A.DYNMIC': 1, 'A.MANAGE': 1, 'A.NOEVIL': 1, 'A.NOTRST': 1, 'A.LOCATE': 1, 'A.PROTCT': 1}}, 'vendor': {'Microsoft': {'Microsoft': 4}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'SPA': 1}, 'FI': {'malfunction': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 2}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 8, 'EAL 2': 2, 'EAL1': 1}}, 'cc_sar': {'ACM': {'ACM_CAP.2': 1}, 'ADO': {'ADO_DEL.1': 1, 'ADO_IGS.1': 1}, 'ADV': {'ADV_FSP.1': 1, 'ADV_HLD.1': 1, 'ADV_RCR.1': 1}, 'AGD': {'AGD_ADM.1': 1, 'AGD_USR.1': 1}, 'ATE': {'ATE_COV': 1, 'ATE_IND': 1, 'ATE_FUN': 1, 'ATE_COV.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_SOF.1': 1, 'AVA_VLA.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 16, 'FAU_SAR.1': 12, 'FAU_SAR.2': 11, 'FAU_SAR.3': 9, 'FAU_SEL.1': 10, 'FAU_STG.4': 10, 'FAU_STG.2': 14, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2.1': 1, 'FAU_SAR.3.1': 1, 'FAU_SEL.1.1': 1, 'FAU_STG.4.1': 1, 'FAU_STG.2.1': 1, 'FAU_STG.2.2': 1, 'FAU_STG.2.3': 1}, 'FIA': {'FIA_ATD.1': 9, 'FIA_UAU.1': 11, 'FIA_UID.1': 13, 'FIA_ATD.1.1': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_AFL.1': 1}, 'FMT': {'FMT_MOF.1': 13, 'FMT_SMF.1': 12, 'FMT_SMR.1': 13, 'FMT_MOF.1.1': 2, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 2, 'FMT_SMR.1.2': 1, 'FMT_MDT.1': 2}, 'FPT': {'FPT_ITT.1': 10, 'FPT_RVM.1': 14, 'FPT_SEP.1': 14, 'FPT_STM.1': 10, 'FPT_ITT.1.1': 1, 'FPT_RVM.1.1': 1, 'FPT_SEP.1.1': 1, 'FPT_SEP.1.2': 1, 'FPT_STM.1.1': 1, 'FPT_ITA.1': 1, 'FPT_ITC.1': 1, 'FPT_ITI.1': 1, 'FPT_STM': 1}}, 'cc_claims': {'O': {'O.ACCESS': 14, 'O.AUDITS': 12, 'O.EADMIN': 8, 'O.IDANLZ': 9, 'O.IDAUTH': 23, 'O.IDSCAN': 11, 'O.IDSENS': 11, 'O.INTEGR': 9, 'O.OFLOWS': 8, 'O.PROTCT': 12, 'O.RESPON': 7, 'O.CREDEN': 8, 'O.INSTAL': 8, 'O.INTROP': 8, 'O.PERSON': 9, 'O.PHYCAL': 10, 'O.EXPORT': 1}, 'T': {'T.COMDIS': 4, 'T.COMINT': 4, 'T.FACCNT': 4, 'T.FALACT': 4, 'T.FALASC': 4, 'T.FALREC': 4, 'T.IMPCON': 4, 'T.INADVE': 4, 'T.INFLUX': 4, 'T.LOSSOF': 4, 'T.MISACT': 4, 'T.MISUSE': 4, 'T.NOHALT': 4, 'T.PRIVIL': 4, 'T.SCNCFG': 4, 'T.SCNMLC': 4, 'T.SCNVUL': 4}, 'A': {'A.ACCESS': 4, 'A.ASCOPE': 4, 'A.DYNMIC': 4, 'A.LOCATE': 4, 'A.MANAGE': 4, 'A.NOEVIL': 4, 'A.NOTRST': 4, 'A.PROTCT': 4}, 'OE': {'OE.AUDIT_PROTECTION': 7, 'OE.PROTECT': 9, 'OE.TIME': 8}}, 'vendor': {'STMicroelectronics': {'STM': 14}, 'Microsoft': {'Microsoft': 3}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'MD': {'MD5': {'MD5': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 2}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'SPA': 2}, 'FI': {'malfunction': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 4}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
    • The cert_lab property was set to None.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ACM_CAP', 'level': 2}, {'_type': 'SAR', 'family': 'ADO_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ADO_IGS', 'level': 1}]} values discarded.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}]}.
  • 28.07.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_extract_ok property was set to True.
    • The report_extract_ok property was set to True.
    • The errors property was set to [].

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 129187, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 16, '/CreationDate': "D:20061101093929-05'00'", '/_EmailSubject': 'VR', '/Author': 'Validation Team', '/Creator': 'Acrobat PDFMaker 7.0 for Word', '/_AuthorEmailDisplayName': 'Ashby,Victoria A.', '/Producer': 'Acrobat Distiller 7.0 (Windows)', '/_AuthorEmail': 'VASHBY@mitre.org', '/ModDate': "D:20061101093947-05'00'", '/_AdHocReviewCycleID': '508012059', '/Company': 'MITRE and NSA', '/SourceModified': 'D:20061101143832', '/Title': 'Validation Report for Juniper Networks', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 1029993, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 91, '/CreationDate': "D:20061101102236-05'00'", '/Author': ' ', '/Version': '1.0', '/CC#20Version': '2.2', '/Creator': 'Acrobat PDFMaker 7.0 for Word', '/Keywords': 'Intrusion Detection System (IDS), Intrusion Detection & Prevention system (IDP), IDP Sensorâ„¢, the IDP Management Serverâ„¢, IDP User Interfaceâ„¢', '/Producer': 'Acrobat Distiller 7.0 (Windows)', '/TOE': 'IDP 4.0 & NSM 2006.1', '/EAL': 'EAL2', '/PPs': 'Intrusion Detection System System Protection Profile, version 1.5', '/ModDate': "D:20061101103840-05'00'", '/Status': 'FINAL', '/SourceModified': 'D:20061101151653', '/Title': 'Security Target', '/Vendor': 'Juniper Networks', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.juniper.net/techpubs/software/management/idp/idp30/IDP_3_0r1_QS_HA.pdf', 'http://www.juniper.net/techpubs/software/management/idp/idp30/IDP_3_0r1_QS.pdf', 'http://cio.nist.gov/esd/emaildir/lists/cc-cmt/msg00019.html', 'http://www.juniper.net/techpubs/software/management/idp/idp30/IDP_650_HG.pdf', 'http://www.juniper.net/techpubs/software/management/idp/idp30/IDP_RAID_1750.pdf', 'http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci283994,00.html', 'http://www.juniper.net/techpubs/software/management/idp/idp30/IDP_3_0_UG.pdf', 'http://www.juniper.net/techpubs/software/management/idp/idp30/IDP_1750_HG.pdf', 'http://www.juniper.net/techpubs/software/management/idp/idp30/IDP_1650_HG.pdf', 'http://www.niap.nist.gov/cc-scheme/pm02_14_aq_ia_it_products.pdf', 'http://www.juniper.net/techpubs/software/management/idp/idp30/IDP_3_0_CG.pdf']}}.

    The computed heuristics were updated.

    • The cert_lab property was set to ['US'].
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': 'st_vid10045-vr.pdf', 'st_filename': 'st_vid10045-st.pdf'}.
    • The report_keywords property was updated, with the {'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL 2': 4}}}}, 'side_channel_analysis': {'__delete__': ['SCA']}, 'tee_name': {}} data.
    • The st_keywords property was updated, with the {'cc_sar': {'__update__': {'ACM': {'__insert__': {'ACM_CAP': 7}, '__update__': {'ACM_CAP.2': 12}}, 'ADO': {'__insert__': {'ADO_DEL': 5, 'ADO_IGS': 6}, '__update__': {'ADO_DEL.1': 5, 'ADO_IGS.1': 5}}, 'ADV': {'__insert__': {'ADV_FSP': 6, 'ADV_HLD': 6, 'ADV_RCR': 6}, '__update__': {'ADV_FSP.1': 8, 'ADV_HLD.1': 11, 'ADV_RCR.1': 4}}, 'AGD': {'__insert__': {'AGD_ADM': 6, 'AGD_USR': 6}, '__update__': {'AGD_ADM.1': 11, 'AGD_USR.1': 9}}, 'ATE': {'__update__': {'ATE_COV': 7, 'ATE_IND': 7, 'ATE_FUN': 7, 'ATE_COV.1': 4, 'ATE_FUN.1': 9, 'ATE_IND.2': 7}}, 'AVA': {'__insert__': {'AVA_SOF': 6, 'AVA_VLA': 6}, '__update__': {'AVA_SOF.1': 6, 'AVA_VLA.1': 8}}}}, 'cc_sfr': {'__update__': {'FAU': {'__insert__': {'FAU_GEN': 2}}, 'FIA': {'__insert__': {'FIA_UAU': 1}, '__update__': {'FIA_UAU.1': 12}}, 'FMT': {'__insert__': {'FMT_MTD': 30}, '__update__': {'FMT_MDT.1': 1}}}}, 'cc_claims': {'__update__': {'O': {'__update__': {'O.AUDITS': 9, 'O.EADMIN': 7, 'O.IDANLZ': 6, 'O.IDAUTH': 22, 'O.IDSCAN': 8, 'O.IDSENS': 10, 'O.INTEGR': 6, 'O.OFLOWS': 7, 'O.PROTCT': 9, 'O.RESPON': 6, 'O.INSTAL': 4, 'O.PERSON': 5}}, 'T': {'__update__': {'T.COMINT': 3, 'T.FALACT': 3, 'T.FALREC': 3, 'T.INADVE': 3, 'T.LOSSOF': 3, 'T.MISUSE': 3, 'T.PRIVIL': 3, 'T.SCNMLC': 3}}, 'A': {'__insert__': {'A': 1}, '__update__': {'A.ASCOPE': 3, 'A.LOCATE': 3, 'A.NOEVIL': 3, 'A.PROTCT': 3}}, 'OE': {'__update__': {'OE.PROTECT': 5}}}}, 'vendor': {'__delete__': ['STMicroelectronics']}, 'side_channel_analysis': {'__delete__': ['SCA']}, 'tee_name': {}} data.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.
  • 16.11.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The st_metadata property was updated, with the {'/CC Version': '2.2'} values inserted.

Raw data

{
  "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert",
  "category": "Network and Network-Related Devices and Systems",
  "cert_link": null,
  "dgst": "036e98932e0c6665",
  "heuristics": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics",
    "cert_id": "CCEVS-VR-06-0043",
    "cert_lab": [
      "US"
    ],
    "cpe_matches": null,
    "direct_dependency_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_ADM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_HLD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_SOF",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_USR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_RCR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VLA",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "2006.1",
        "4.0"
      ]
    },
    "indirect_dependency_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Juniper Networks, Inc.",
  "manufacturer_web": "https://www.juniper.net/",
  "name": "Juniper Networks IDP 4.0 \u0026 NSM 2006.1",
  "not_valid_after": "2012-09-06",
  "not_valid_before": "2006-10-23",
  "pdf_data": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData",
    "report_filename": "st_vid10045-vr.pdf",
    "report_frontpage": {
      "anssi": {},
      "bsi": {},
      "canada": {},
      "niap": {
        "cert_id": "CCEVS-VR-06-0043",
        "cert_item": "Juniper Networks JUNIPER NETWORKS IDP 4.0 \u0026 NSM 2006.1",
        "cert_lab": "US NIAP"
      },
      "nscib": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "US": {
          "CCEVS-VR-06-0043": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.ACCESS": 1,
          "A.ASCOPE": 1,
          "A.DYNMIC": 1,
          "A.LOCATE": 1,
          "A.MANAGE": 1,
          "A.NOEVIL": 1,
          "A.NOTRST": 1,
          "A.PROTCT": 1
        },
        "T": {
          "T.COMDIS": 1,
          "T.COMINT": 1,
          "T.FACCNT": 1,
          "T.FALACT": 1,
          "T.FALASC": 1,
          "T.FALREC": 1,
          "T.IMPCON": 1,
          "T.INADVE": 1,
          "T.INFLUX": 1,
          "T.LOSSOF": 1,
          "T.MISACT": 1,
          "T.MISUSE": 1,
          "T.NOHALT": 1,
          "T.PRIVIL": 1,
          "T.SCNCFG": 1,
          "T.SCNMLC": 1,
          "T.SCNVUL": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {
        "EAL": {
          "EAL 2": 4
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "FI": {
          "malfunction": 1
        }
      },
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 4
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Validation Team",
      "/Company": "MITRE and NSA",
      "/CreationDate": "D:20061101093929-05\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 7.0 for Word",
      "/ModDate": "D:20061101093947-05\u002700\u0027",
      "/Producer": "Acrobat Distiller 7.0 (Windows)",
      "/SourceModified": "D:20061101143832",
      "/Title": "Validation Report for Juniper Networks",
      "/_AdHocReviewCycleID": "508012059",
      "/_AuthorEmail": "VASHBY@mitre.org",
      "/_AuthorEmailDisplayName": "Ashby,Victoria A.",
      "/_EmailSubject": "VR",
      "pdf_file_size_bytes": 129187,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 16
    },
    "st_filename": "st_vid10045-st.pdf",
    "st_frontpage": {
      "anssi": {},
      "bsi": {},
      "canada": {},
      "niap": {},
      "nscib": {}
    },
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A": 1,
          "A.ACCESS": 4,
          "A.ASCOPE": 3,
          "A.DYNMIC": 4,
          "A.LOCATE": 3,
          "A.MANAGE": 4,
          "A.NOEVIL": 3,
          "A.NOTRST": 4,
          "A.PROTCT": 3
        },
        "O": {
          "O.ACCESS": 14,
          "O.AUDITS": 9,
          "O.CREDEN": 8,
          "O.EADMIN": 7,
          "O.EXPORT": 1,
          "O.IDANLZ": 6,
          "O.IDAUTH": 22,
          "O.IDSCAN": 8,
          "O.IDSENS": 10,
          "O.INSTAL": 4,
          "O.INTEGR": 6,
          "O.INTROP": 8,
          "O.OFLOWS": 7,
          "O.PERSON": 5,
          "O.PHYCAL": 10,
          "O.PROTCT": 9,
          "O.RESPON": 6
        },
        "OE": {
          "OE.AUDIT_PROTECTION": 7,
          "OE.PROTECT": 5,
          "OE.TIME": 8
        },
        "T": {
          "T.COMDIS": 4,
          "T.COMINT": 3,
          "T.FACCNT": 4,
          "T.FALACT": 3,
          "T.FALASC": 4,
          "T.FALREC": 3,
          "T.IMPCON": 4,
          "T.INADVE": 3,
          "T.INFLUX": 4,
          "T.LOSSOF": 3,
          "T.MISACT": 4,
          "T.MISUSE": 3,
          "T.NOHALT": 4,
          "T.PRIVIL": 3,
          "T.SCNCFG": 4,
          "T.SCNMLC": 3,
          "T.SCNVUL": 4
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ACM": {
          "ACM_CAP": 7,
          "ACM_CAP.2": 12
        },
        "ADO": {
          "ADO_DEL": 5,
          "ADO_DEL.1": 5,
          "ADO_IGS": 6,
          "ADO_IGS.1": 5
        },
        "ADV": {
          "ADV_FSP": 6,
          "ADV_FSP.1": 8,
          "ADV_HLD": 6,
          "ADV_HLD.1": 11,
          "ADV_RCR": 6,
          "ADV_RCR.1": 4
        },
        "AGD": {
          "AGD_ADM": 6,
          "AGD_ADM.1": 11,
          "AGD_USR": 6,
          "AGD_USR.1": 9
        },
        "ATE": {
          "ATE_COV": 7,
          "ATE_COV.1": 4,
          "ATE_FUN": 7,
          "ATE_FUN.1": 9,
          "ATE_IND": 7,
          "ATE_IND.2": 7
        },
        "AVA": {
          "AVA_SOF": 6,
          "AVA_SOF.1": 6,
          "AVA_VLA": 6,
          "AVA_VLA.1": 8
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 2,
          "EAL1": 1,
          "EAL2": 8
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 2,
          "FAU_GEN.1": 16,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_SAR.1": 12,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1,
          "FAU_SAR.2": 11,
          "FAU_SAR.2.1": 1,
          "FAU_SAR.3": 9,
          "FAU_SAR.3.1": 1,
          "FAU_SEL.1": 10,
          "FAU_SEL.1.1": 1,
          "FAU_STG.2": 14,
          "FAU_STG.2.1": 1,
          "FAU_STG.2.2": 1,
          "FAU_STG.2.3": 1,
          "FAU_STG.4": 10,
          "FAU_STG.4.1": 1
        },
        "FIA": {
          "FIA_AFL.1": 1,
          "FIA_ATD.1": 9,
          "FIA_ATD.1.1": 1,
          "FIA_UAU": 1,
          "FIA_UAU.1": 12,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UID.1": 13,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1
        },
        "FMT": {
          "FMT_MDT.1": 1,
          "FMT_MOF.1": 13,
          "FMT_MOF.1.1": 2,
          "FMT_MTD": 30,
          "FMT_SMF.1": 12,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 13,
          "FMT_SMR.1.1": 2,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_ITA.1": 1,
          "FPT_ITC.1": 1,
          "FPT_ITI.1": 1,
          "FPT_ITT.1": 10,
          "FPT_ITT.1.1": 1,
          "FPT_RVM.1": 14,
          "FPT_RVM.1.1": 1,
          "FPT_SEP.1": 14,
          "FPT_SEP.1.1": 1,
          "FPT_SEP.1.2": 1,
          "FPT_STM": 1,
          "FPT_STM.1": 10,
          "FPT_STM.1.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "SSH": {
          "SSH": 2
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "FI": {
          "malfunction": 2
        }
      },
      "standard_id": {
        "ISO": {
          "ISO/IEC 15408": 2,
          "ISO/IEC 18045": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 3
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": " ",
      "/CC Version": "2.2",
      "/CreationDate": "D:20061101102236-05\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 7.0 for Word",
      "/EAL": "EAL2",
      "/Keywords": "Intrusion Detection System (IDS), Intrusion Detection \u0026 Prevention system (IDP), IDP Sensor\u2122, the IDP Management Server\u2122, IDP User Interface\u2122",
      "/ModDate": "D:20061101103840-05\u002700\u0027",
      "/PPs": "Intrusion Detection System System Protection Profile, version 1.5",
      "/Producer": "Acrobat Distiller 7.0 (Windows)",
      "/SourceModified": "D:20061101151653",
      "/Status": "FINAL",
      "/TOE": "IDP 4.0 \u0026 NSM 2006.1",
      "/Title": "Security Target",
      "/Vendor": "Juniper Networks",
      "/Version": "1.0",
      "pdf_file_size_bytes": 1029993,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://cio.nist.gov/esd/emaildir/lists/cc-cmt/msg00019.html",
          "http://www.juniper.net/techpubs/software/management/idp/idp30/IDP_1650_HG.pdf",
          "http://www.niap.nist.gov/cc-scheme/pm02_14_aq_ia_it_products.pdf",
          "http://www.juniper.net/techpubs/software/management/idp/idp30/IDP_650_HG.pdf",
          "http://www.juniper.net/techpubs/software/management/idp/idp30/IDP_1750_HG.pdf",
          "http://www.juniper.net/techpubs/software/management/idp/idp30/IDP_3_0r1_QS.pdf",
          "http://www.juniper.net/techpubs/software/management/idp/idp30/IDP_3_0_CG.pdf",
          "http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci283994,00.html",
          "http://www.juniper.net/techpubs/software/management/idp/idp30/IDP_RAID_1750.pdf",
          "http://www.juniper.net/techpubs/software/management/idp/idp30/IDP_3_0r1_QS_HA.pdf",
          "http://www.juniper.net/techpubs/software/management/idp/idp30/IDP_3_0_UG.pdf"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 91
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/st_vid10045-vr.pdf",
  "scheme": "US",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/st_vid10045-st.pdf",
  "state": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState",
    "errors": [],
    "report_convert_garbage": false,
    "report_convert_ok": true,
    "report_download_ok": true,
    "report_extract_ok": true,
    "report_pdf_hash": "a9a53c19529c17bb454bf50e828dc9e8e480a2902763471c6aa30c6d0a52dc6f",
    "report_txt_hash": "cb58a3c22bfaec1928856e8cd27bc8e11c5eb68a0fc001b7206b938b06286c91",
    "st_convert_garbage": false,
    "st_convert_ok": true,
    "st_download_ok": true,
    "st_extract_ok": true,
    "st_pdf_hash": "91669b8384fc571c070dfbf15082d7b1a5f92f63d14623b36b9a7fc8cfe96204",
    "st_txt_hash": "874d98426913cc02761e00ebd74d75efd3909701b8768dd2420d4ecee2ec2de1"
  },
  "status": "archived"
}